what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms00-100

ms00-100
Posted Dec 23, 2000

Microsoft Security Bulletin (MS00-100) - Microsoft has released a patch that eliminates the "Malformed Web Form Submission" security vulnerability in a component that ships as part of Microsoft Internet Information Server. The FrontPage Server Extensions (FPSE) which ship with and are installed by default as part of IIS 4.0 and 5.0 have a vulnerability which crashes IIS when a malformed form submission is sent. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | 0570cc66d8a2848c8d874674c177c4fefa1b9043c8e990e815130176ea89c8ad

ms00-100

Change Mirror Download
   Microsoft Security Bulletin (MS00-100)

Patch Available for Malformed Web Form Submission Vulnerability

Originally posted: December 22, 2000

Summary

Microsoft has released a patch that eliminates a security
vulnerability in a component that ships as part of Microsoft® Internet
Information Server. The vulnerability could potentially allow an
attacker to prevent an affected web server from providing useful
service.

Frequently asked questions regarding this vulnerability and the patch
can be found at
http://www.microsoft.com/technet/security/bulletin/fq00-100.asp

Issue

The FrontPage Server Extensions (FPSE) ship with and are installed by
default as part of IIS 4.0 and 5.0. The most familiar FPSE functions
allow web site and content management; however, FPSE also provides
browse-time support functions. Among the functions included in the
latter category are ones that help process web forms that have been
submitted by a user. A vulnerability exists in one of these functions.
If a malicious user levied a specially-malformed form submission to an
affected server, it would cause the IIS service to fail. The
vulnerability does not provide the opportunity to misuse any of the
FPSE administrative or content management functions.

To resume normal operation on an IIS 4.0 server, the operator would
need to restart the service. In contrast, if an IIS 5.0 server were
attacked via this vulnerability, the IIS service would, by default,
automatically restart almost immediately. Although any web sessions
that were in progress at the time of the attack would be lost, the
server would be able to accept new connections as soon as the service
was restarted. FPSE is installed by default as part of IIS 4.0 and
5.0, but, in keeping with best practices, Microsoft recommends that
they be disabled if not needed.

Affected Software Versions

* Microsoft IIS 4.0
* Microsoft IIS 5.0

Patch Availability

* Microsoft IIS 5.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26277
* Microsoft IIS 4.0:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=26704

Note: The IIS 5.0 patch can be applied atop system running either
Windows 2000 Gold or Service Pack 1. It will be included in Windows
2000 Service Pack 2.

Note: The IIS 4.0 patch can be applied atop system running Windows NT
4.0 Service Pack 6a or 5. It will be included in Windows NT 4.0
Service Pack 7.

Note: IIS users who have removed the FPSE are not affected by this
vulnerability and do not need to take further action.

Note Additional security patches are available at the Microsoft
Download Center

More Information

Please see the following references for more information related to
this issue.
* Frequently Asked Questions: Microsoft Security Bulletin MS00-100,
http://www.microsoft.com/technet/security/bulletin/fq00-100.asp
* Microsoft Knowledge Base article Q280322 discusses this issue and
will be available soon.
* Microsoft TechNet Security web site,
http://www.microsoft.com/technet/security/default.asp

Obtaining Support on this Issue

This is a fully supported patch. Information on contacting Microsoft
Product Support Services is available at
http://support.microsoft.com/support/contact/default.asp.

Acknowledgments

Microsoft thanks eEye Digital Security (http://www.eEye.com) for
reporting this issue to us and working with us to protect customers.

Revisions

* December 22, 2000: Bulletin Created.

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.

Last updated December 21, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of use.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close